No, this should work for all current LS with current firmware (>= 1.36 and maybe even the ones before).<br>

No, this should work for all current LS with current firmware (>= 1.36 and maybe even the ones before).<br>

−

According to the firmware readme of the LS series, the following models all should work the same way:

+

According to the [http://opensource.buffalo.jp/ls-x-140.html firmware readme] of the LS series, the following models all should work the same way:

−

LS-CHL-V2

+

LS-AVL

−

LS-VL

+

LS-CHL-V2

−

LS-WSXL

+

LS-QVL

−

LS-WVL

+

LS-SL

−

LS-WXL

+

LS-VL

−

LS-XHL

+

LS-WSXL

−

But you can also use the guide from the LS-XHL, but the one from the LS-XHL is more complicated.<br>

+

LS-WVL

−

[[Open Stock Firmware LS-XHL]]

+

LS-WXL

+

LS-XHL

+

+

Alternatively you can use the guide from the [[Open Stock Firmware LS-XHL|LS-XHL]], which is more complicated.<br>

+

See the last chapter for a speciality of the LS-CHL-V2.

=What will be done?=

=What will be done?=

Line 26:

Line 30:

=What is necessary?=

=What is necessary?=

−

You need a private/public key pair for ssh.<br>

+

You need a private/public key pair for ssh conforming with the OpenSSH format.<br>

−

You can create such a pair using Putty on Windows. The private key will be used by Putty and the public key will be transfered to the LS and used by sshd.<br>

+

You can create such a pair using Puttygen.exe on Windows. The private key will be used by Putty and the public key will be transfered to the LS and used by sshd. But be aware that the standard Puttygen export format for the public key is NOT conforming to the OpenSSH format! Use copy and paste from the result window of Puttygen instead.<br>

On Linux you can create the keypair with ssh_keygen.

On Linux you can create the keypair with ssh_keygen.

−

=The guide=

+

= The Guide =

−

Please replace the IP address within the commandlines below against the one from your LS.

+

−

Put your public key in a file named ''authorized_keys'' and put the file onto the share "share" (do not use a subdirectory).

+

Basic steps are:

+

# Generate a SSH public key (if you not already have one)

+

# Put the SSH public key into /root/.ssh/authorized_keys on your LS

+

# Enable root login in /etc/sshd_config

+

# Start sshd on the LS

−

First we will create the directory for the ssh keys which the box should accept for logins as root.

# Put the lines below into a a file named ''open-ls.txt'' and put it in the same place.

+

#!/bin/bash

+

# open-ls.txt -- This script will be executed on the LS

+

+

# DIR is where we are

+

DIR=$( cd $(dirname $0) ; pwd)

+

+

# Create the directory for the ssh keys and copy the pubkey there

+

mkdir /root/.ssh

+

chmod 700 /root/.ssh

+

cp $DIR/authorized_keys /root/.ssh/

+

chmod 600 /root/.ssh/authorized_keys

+

# Required if 'authorized_keys' have een written on a Windows PC

+

dos2unix /root/.ssh/authorized_keys

+

+

### Enable root login for SSH

+

# Backup sshd_config

+

cp -p /etc/sshd_config /etc/sshd_config.orig

+

# Replace all "PermitRootLogin no" by "PermitRootLogin yes"

+

sed -i '/PermitRootLogin/s/no/yes/' /etc/sshd_config

+

chmod 600 /etc/sshd_config

+

# Verify

+

grep PermitRootLogin /etc/sshd_config

+

+

# Last we restart the sshd.

+

/etc/init.d/sshd.sh restart

+

# Run the script remote on your LS using acp_commander

+

: In the next command-lines please replace the ''$IPADDR'' by the IP-address of your LS. If your NAS is configured to use RAID1, you may need to change the path to the share from ''disk1'' to ''array1''.

As an alternative, here is a Unix/Linux script to ease copying the files and execute the copied script. There is no need to save it onto a file, simply copy and paste line by line into you shell, while adapting to your needs.

'''Note:''' If you receive the message "'''Server refuse our key'''", the possibility is high, that you made a mistake using Puttygen.exe (you used the export key feature instead of copy & paste the public key out of the display window).<br>

+

To solve this, you can try to copy the key file again using the command (assuming you put the exported file "key.pub" onto the share into the directory authorized_keys):

'''Note:''' If you receive the message "'''Server refuse our key'''", try copying the key file again using the command:

+

An another possibility to receive "'''Server refuced our key'''" message is, if the unix scripts were not of unix format. When scripts are run using Windows PC format, the folder ".ssh" is actually created as ".ssh^M", and then the login with the key won't work.

You can do whatever you want with your LS, because it is '''open'''!<br><br>

+

If you are using PuTTY on a Windows PC, remember to browse for the private key file under "Connection -> SSH -> Auth -> Private key file for authentication". <br>

+

Now you can do whatever you want with your LS, because it is '''open'''!<br><br>

If you want to convert your data partition filesystem from XFS to ext3, look into the guide of the LS-XHL but be aware that there is a small difference explained after the link: [[Open Stock Firmware LS-XHL]]<br>

If you want to convert your data partition filesystem from XFS to ext3, look into the guide of the LS-XHL but be aware that there is a small difference explained after the link: [[Open Stock Firmware LS-XHL]]<br>

When you did everything mentioned in the guide (which you '''have''' to do!), it is still not working due to a coding error by Buffalo.<br>

When you did everything mentioned in the guide (which you '''have''' to do!), it is still not working due to a coding error by Buffalo.<br>

Line 76:

Line 138:

mount -t ${USERLAND_FS} ${DEV1} /mnt/disk1

mount -t ${USERLAND_FS} ${DEV1} /mnt/disk1

+

=Speciality of the LS-CHL-V2=

+

For some reasons, the LS-CHL-V2 is excluded (by Buffalo) from the boxes supporting SSH connections.<br>

+

The "exclusion" is done via the sanity application and prevents us from changing the SUPPORT_SFTP variable in the file "nas_feature" (and it doesn't matter if we patch the flash environment or not).<br>

+

Therefore one needs to remove the following lines from the /etc/init.d/sshd.sh:

+

if [ "${SUPPORT_SFTP}" = "0" ] ; then

+

echo "Not support sftp on this model." > /dev/console

+

exit 0

+

fi

+

And one needs to link the /etc/init.d/sshd.sh into the /etc/rc.d/extensions.d directory for automatic start at bootup (do '''not''' mess around with /etc/init.d/rcS):

Do not use the "-o" option of the acp_commander. It will not work. Do not use "-addons" either, because it will copy incompatible software onto the box.

Is this guide working for the LS-VL only?

No, this should work for all current LS with current firmware (>= 1.36 and maybe even the ones before).
According to the firmware readme of the LS series, the following models all should work the same way:

LS-AVL
LS-CHL-V2
LS-QVL
LS-SL
LS-VL
LS-WSXL
LS-WVL
LS-WXL
LS-XHL

Alternatively you can use the guide from the LS-XHL, which is more complicated.
See the last chapter for a speciality of the LS-CHL-V2.

What will be done?

We will use the "-c" feature of acp_commander. This will execute the command as user root (without a profile loaded).

We will also use the share "share" to copy some files for gaining access.

We will not use telnet but ssh for "opening".

What is necessary?

You need a private/public key pair for ssh conforming with the OpenSSH format.
You can create such a pair using Puttygen.exe on Windows. The private key will be used by Putty and the public key will be transfered to the LS and used by sshd. But be aware that the standard Puttygen export format for the public key is NOT conforming to the OpenSSH format! Use copy and paste from the result window of Puttygen instead.
On Linux you can create the keypair with ssh_keygen.

The Guide

Basic steps are:

Generate a SSH public key (if you not already have one)

Put the SSH public key into /root/.ssh/authorized_keys on your LS

Enable root login in /etc/sshd_config

Start sshd on the LS

For that you will

Generate a SSH public key (if you not already have one)

Create a text-file/script open-ls.txt

Copy both your SSH public key and this script to your LS

Run the script remote on your LS using acp_commander

Finished :-)

Look below for a Linux/Unix script easing the next three steps.

Put your public key in a file named authorized_keys and put the file into the share "share" (do not use a subdirectory to make this guide work).

Put the lines below into a a file named open-ls.txt and put it in the same place.

As an alternative, here is a Unix/Linux script to ease copying the files and execute the copied script. There is no need to save it onto a file, simply copy and paste line by line into you shell, while adapting to your needs.

Note: If you receive the message "Server refuse our key", the possibility is high, that you made a mistake using Puttygen.exe (you used the export key feature instead of copy & paste the public key out of the display window).
To solve this, you can try to copy the key file again using the command (assuming you put the exported file "key.pub" onto the share into the directory authorized_keys):

If your NAS is configured to use RAID1, you may need to change the path to the share from disk1 to array1 for the copy and ssh-keygen commands to work correctly

An another possibility to receive "Server refuced our key" message is, if the unix scripts were not of unix format. When scripts are run using Windows PC format, the folder ".ssh" is actually created as ".ssh^M", and then the login with the key won't work.

Firmware 1.42 Specialities

If you have problems establishing a ssh connection, it could be possible that this is caused by a missing file of the PAM configuration.
By comparing 1.42 with 1.36, there is no "/etc/pam.d/sshd" anymore.
You can add this file yourself by copying this content (1:1 copy of 1.36) to the file:

The result

You can now connect as root via "ssh root@192.168.172.1".
If you are using PuTTY on a Windows PC, remember to browse for the private key file under "Connection -> SSH -> Auth -> Private key file for authentication".
Now you can do whatever you want with your LS, because it is open!

If you want to convert your data partition filesystem from XFS to ext3, look into the guide of the LS-XHL but be aware that there is a small difference explained after the link: Open Stock Firmware LS-XHL
When you did everything mentioned in the guide (which you have to do!), it is still not working due to a coding error by Buffalo.
Yes, they got it wrong again (do they have quality management, in form of code reviews, in their programming department at all?).
They coded their own shell function wrong. The comment says 3 parameters with the third parameter optional and the funtion is testing for "equal 2"??
Inside the function, they indeed use the third parameter to determine which filesystem to mount, with xfs as default. Without the possibility to pass a third parameter, the function will always mount as xfs.
So I had to patch /etc/rc.d/sysinit.d/S25start_data_array.sh line 622 within the section "${SUPPORT_RAID} = off".
Because mount_DataDisks_sub is ignoring the third parameter (that would be the filesystem), I replaced the line with:

mount -t ${USERLAND_FS} ${DEV1} /mnt/disk1

Speciality of the LS-CHL-V2

For some reasons, the LS-CHL-V2 is excluded (by Buffalo) from the boxes supporting SSH connections.
The "exclusion" is done via the sanity application and prevents us from changing the SUPPORT_SFTP variable in the file "nas_feature" (and it doesn't matter if we patch the flash environment or not).
Therefore one needs to remove the following lines from the /etc/init.d/sshd.sh: